Thursday, February 27, 2025
HomeTechnologyBrowser Autofill Feature Poses Security Risks

Browser Autofill Feature Poses Security Risks

Published on

SIEM as a Service

Follow Us on Google News

Browser Autofill feature helps you to save your credentials like call, email, address, cellphone quantity, etc. so you don’t have to fill it manually time and again.Tragically, it’s helpful for attackers, as well.

Despite that maximum users see Autofill feature as a comfort that gives ease while filling out credentials, it is able to also result in large protection risks main to financial losses and a chance to personal facts.

This proof-of-concept demo website consists of a simple online web form with just two fields: name and email.

But what’s not visible are many out of sight fields, including the credit card information, phone number, organization, address, postal code, city etc.

Browser Autofill Feature Poses Security Risks
Browser Autofill Feature Poses Security Risks

Fields inside the page may also get auto-filled alongside no less than one seen, standard content zone that is typically placed in some other container inside a similar frame.

Browsers vulnerable against the assault incorporate Google Chrome, Apple Safari and Opera. Then again, if you utilize Mozilla Firefox or Tor, you don’t have to stress over this issue in light of the fact that Mozilla doesn’t encourage auto-filling many fields at once.

On the positive side, this strategy alone can’t catch passwords spared in the program since they’re fixing to a particular domain, yet that is not going to feeling somebody that lost their individuality and financial information.

How to Mitigate the Risk

One of the unfeasible methodologies is investigate the source code of the page before submitting anything. In any case, this is impractical essentially and furthermore includes specialized know-how. Consequently, the best approach is incapacitate autofill highlight for all time.

Disable auto-filling of online forms – Opera

  • Tap on the Opera button.
  • Go to Settings > Privacy & security.
  • In the right pane, scroll to the “Autofill“.
  • Uncheck “Enable auto-filling of forms on webpages“.

Disable auto-filling of online forms – Chrome

  • Load Google Chrome browser in your PC.
  • Tap on the upper right side corner of your program window to open “Settings”.
  • Tap on the “Advanced Setting” to look down to the “Passwords and forms” section.
  • Expel the check stamp from “Enable Autofill to fill out web forms in a single click” and “Offer to save your web passwords.”

Disable auto-filling of online forms – Safari

  • Click on the Safari menu > Preferences > Autofill tab.
  • Next to “AutoFill Web Forms” uncheck the following options:
    • Using info from my Address Book card
    • User names and passwords
    • Other forms
  • Close the preferences window.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Phishing Attack Exploit CEOs, CTOs, and Top Decision-Makers

A recent phishing campaign conducted by cybersecurity firm Hackmosphere has revealed alarming vulnerabilities among...

How Copy Trading Can Enhance Your Trading Results

Over the past few years, Forex copy trading has become increasingly popular among investors...

The Biggest Cybersecurity Mistakes You’re Probably Making (and How to Fix Them)

Cybersecurity threats are growing every day, yet many people continue to make simple mistakes...